Название: Handbook of Intelligent Computing and Optimization for Sustainable Development
Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Жанр: Техническая литература
isbn: 9781119792628
isbn:
c. Case with error detection and correctionThird scenario is with errors and correction. This is proposed scenario in which we will simulate the loop with errors and then correct the errors to find out the best way to reach at the destination node. To correct the errors, we will change the way/nodes that are faulty in the whole scenario and choose another node for the receiver node. The simulation of such scenario is shown in figure. It will pass through.
6.5.7 Delay
The delays calculation and simulation results for different scenario are presented in Figure 6.20.
6.5.8 Packet Delivery Ratio
Packet delivered out of 100 for first path: 60.9696 in which we face no errors during the simulation of VANETs. Packet delivered out of 100 for second path: 86.9899 in which we face errors during simulation and we started the loop from the start and delivered the packet. Packet delivered out of 100 for third path: 86.9899 in which we corrected the error and successfully delivered the packet from sender to receiver as shown in Figure 6.21.
Figure 6.20 Delay.
Figure 6.21 Packet delivery ratio.
6.5.9 Throughput
Energy is the parameter in which energy absorbed by a node during the transformation of information from sender to receiver in scenario with errors more energy is used than scenario without error as shown in Figure 6.22.
Figure 6.22 Throughput.
6.6 CrANs
6.6.1 Deploy of Nodes
nodex_g, nodey_g, nodex, nodey_e, nodex, nodey, good_node, and enc are deploy nodes. High = 10 (upper bound for node value) low = 0(lower bound for node value). Next is to enter the number of nodes. We will calculate good and bad nodes from the total nodes, and at the end display the nodes consisting of three protocols as depicted in Figure 6.23.
Figure 6.23 Placement of nodes.
6.6.2 Info Transfer 1
Now, enter the source and receiver node from the total displaced nodes. Put the values of sender and receiver node. Now, put range of node which is 2 here. Assign the sender coordinates and draw the circle by the function.
Find out the fault in routes and times in delivery. Next is the procedure of number of steps. First is to finding nodes which are in range to the sender nodes, calculate distances of senders with nodes in its range, indexes of ranged nodes with respect to sender, calculate distance between sender and all other nodes, select only the nodes in range. Now, make group of ranged nodes, and then, apply DE and find cost of all the groups collected. Selecting node combination with best cost, finding the closest node to the receiver, out of the selected ranged nodes, distance of the ranged nodes to receiver, arranging the indexes. Now, find the next node to hop on, from next hop to the receiver node draw the line and circle.
6.6.3 Calculate the Fitness Function
For fitness function, we have many trust measurement alpha = 0.6, beta = 0.4, DP_f = 1, CP_f = 1, T_ab = alpha*DP_f + beta*CP_f, residual battery life, E = 100 (Enter power for each node), Ef = 60 (Enter power required to forward single packet), Eq = 30 (Enter dissipated power of the equipment), RBL = E/(Ef + Eq), hop count, fitness function, k1 = 0.1, fit = (Hopcount*k1) + (1 − T_ab) + (1/RBL), as shown in Figure 6.24.
6.6.4 Routing Nodes
After the fitness function, simulation start generating results in green and red nodes while green are good and red are bad nodes as presented in Figure 6.25.
Figure 6.24 Good and bad nodes.
Figure 6.25 Fitness function.
6.7 Conclusion
An important structure of CrANs has been proposed, designing, simulating, and characterizing of the adhoc network application. The design that we proposed is implemented in Edraw Max and MATLAB simulator. The results are more accurate than the previous adhoc networks (WSN, MANETs, VANETs, and FANETs). If we compare the results of WSN, MANETs, VANETs, and FANETs with CrANs, we can find out that CrANs is better than previous adhoc networks. The proposed design is simple, compact, and easy to simulate.
References
1. Mehmood, Z., Iqbal, M., Wang, X., Comprehensive Experimental Performance Analysis of DSR, AODV and DSDV Routing Protocol for Different Metrics Values with Predefined Constraints. Int. J. Inf. Technol. Comput. Sci., 6, 2014.
2. Periyasamy, P. and Karthikeyan, E., Energy Optimized Adhoc on-Demand Multipath Routing Protocol for Mobile Adhoc Networks. Int. J. Intell. Syst. Appl., 11, 2014.
3. Hayat, S., Liu, X., Li, Y., Zhou, Y., Comparative Analysis of VANET’s Routing Protocol Classes: An Overview of Existing Routing Protocol Classes and Futuristic Challenges. 2019 IEEE 2nd International Conference on Electronics Technology (ICET), 2019.
4. Oubbati, O.S., Lakas, A., Zhou, F., Güneş, M., Yagoubi, M.B., A survey on position-based routing protocols for Flying Adhoc Networks (FANETs). Veh. Commun., 10, 2017.
5. СКАЧАТЬ